Secure your networks against attacks, hacks, and intruders with this fast paced and intensive security course using Kali Linux

$34.00

RRP $39.99

Want this title & more?

$16.99 p/month

Subscribe to PacktLib

Enjoy full and instant access to over 2000 books and videos – you’ll find everything you need to stay ahead of the curve and make sure you can always get the job done.

Video Details

ISBN 139781782162926

Course Length2 hours 44 minutes

About This Video

This course will offer a complete roadmap for the penetration testing process from start to finish.

Experience hands-on video demonstrations regarding how to use an extensive collection of tools within the Kali-Linux environment to perform penetration tests against every aspect of a target network.

Advanced techniques with detailed explanations that are useful to novice users and experienced viewers alike

Who This Video Is For

Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide is a great choice for anybody interested in information security, penetration testing or ethical hacking. While a basic understanding of Linux and TCP/IP will be helpful in understanding the content, it is not essential.

Table of Contents

Lab Preparation

Developing a Network Environment

How to Install Oracle VirtualBox

How to Install VMware Player

How to Install Kali Linux

Increasing Network Attack Surface

Information Gathering and Reconnaissance

Passive Reconnaissance

Google Hacking

Subdomain Enumeration with Google Hacking

Reconnaissance Tools (Dmitry & Goofile)

Network Enumeration with Maltego

Target Discovery

Layer 2 Discovery

Layer 3 Discovery

Host Discovery with nmap

Network Discovery with Scapy

Fingerprinting Operating Systems

Scanning and Enumeration

Scanning with nmap

Scanning with Zenmap

Nmap Scripting

Zombie Scanning

Service Identification

Vulnerability Mapping

Metasploit Auxilliary Scans

Installing Nessus

Nessus Scanning

Nessus Policies

Nessus Result Analysis

Exploitation with Metasploit

Metasploit Framework

Meterpreter Basics

Meterpreter - Advanced Exploitation

Installing Metasploit Pro

Exploitation with Metasploit Pro

Hands-on Exploitation

Exploit Database

Social Engineering Toolkit - Credential Harvester

Burp Suite Intruder

Web Application Exploitation

Maintaining Access

Privilege Escalation

Ettercap

Hash Identifier / Find-My-Hash

Hydra

John the Ripper

Johnny / xHydra

What You Will Learn

Prepare a fully-functional and low-budget security lab, where you can practice and develop your penetration testing skills without fear of legal consequence

Gather information about a target with advanced reconnaissance techniques

Identify target systems on a network using host discovery tools

Identify services running on target systems by scanning and enumeration

Discover vulnerabilities to determine potential attack vectors

Launch automated exploits and payloads using the Metasploit Framework

Learn a variety of hands-on techniques to exploit target systems

Establish backdoors to ensure continued access

Escalate privileges to acquire maximum control over compromised systems

In Detail

Kali Linux is the latest Linux distribution from Offensive Security, custom-built for the distinct purposes of performing network security audits and forensic investigations. Kali comes fully loaded with hundreds of integrated tools to perform every aspect of a penetration test.

Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide helps you to develop practical and useful professional skills in the information security industry, while simultaneously delivering the high level of excitement and exhilaration that goes hand-in-hand with the world of computer and network hacking.

Cyber-crime is on the rise and information security is becoming more paramount than ever before. A single attack on a company’s network infrastructure can often result in irreparable damage to a company’s assets and/or reputation.

It is no longer sufficient to merely rely on traditional security measures. In order to ensure the security of critical information assets, it is essential to become familiar with the strategies, tactics, and techniques that are used by actual hackers who seek to compromise your network.

Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide will prepare you to enter the world of professional hacking by ensuring that you are well versed with the skills needed and tools used to compromise the security of enterprise networks and information systems.

Authors

Justin Hutchens

Justin Hutchens currently works as a security consultant and regularly performs penetration tests and security assessments for a wide range of clients. He previously served in the United States Air Force where he worked as an intrusion detection specialist, network vulnerability analyst and malware forensic investigator for a large enterprise network with over 55,000 networked systems. He currently holds a Bachelor’s degree in Information Technology and multiple professional information security certifications, to include CISSP (Certified Information Systems Security Professional), OSCP (Offensive Security Certified Professional), eWPT (eLearnSecurity Web-Application Penetration Tester), GCIH (GIAC Certified Incident Handler), CNDA (Certified Network Defense Architect), CEH (Certified Ethical Hacker), ECSA (EC-Council Certified Security Analyst) and CHFI (Computer Hacking Forensic Investigator).

Alerts & Offers

Series & Level

We understand your time is important. Uniquely amongst the major publishers, we seek to develop and publish the broadest range of learning and information products on each technology. Every Packt product delivers a specific learning pathway, broadly defined by the Series type. This structured approach enables you to select the pathway which best suits your knowledge level, learning style and task objectives.

Learning

As a new user, these step-by-step tutorial guides will give you all the practical skills necessary to become competent and efficient.

Beginner's Guide

Friendly, informal tutorials that provide a practical introduction using examples, activities, and challenges.

Essentials

Fast paced, concentrated introductions showing the quickest way to put the tool to work in the real world.

Cookbook

A collection of practical self-contained recipes that all users of the technology will find useful for building more powerful and reliable systems.

Blueprints

Guides you through the most common types of project you'll encounter, giving you end-to-end guidance on how to build your specific solution quickly and reliably.

Mastering

Take your skills to the next level with advanced tutorials that will give you confidence to master the tool's most powerful features.

Starting

Accessible to readers adopting the topic, these titles get you into the tool or technology so that you can become an effective user.

Progressing

Building on core skills you already have, these titles share solutions and expertise so you become a highly productive power user.